Learn how you can prevent, combat and respond effectively to today’s threats in this highly interactive lunch-and-learn. Our all-demo, all-security agenda features core Citrix technologies for acces...

You are invited to an exclusive premier screening of Star Wars: The Last Jedi on Thursday, December 14, 2017! Before the journey to a galaxy far, far away, you’ll learn how Nutanix and Citrix can he...

No events of this type are currently scheduled

Organizations are turning to applications and desktops being delivered as a service to better leverage infrastructure and cloud resources, and to redistribute budget from CapEx to OpEx. But it's not...

Windows 10 and the proliferation of BYO devices introduced into the workforce has transformed the digital workspace and forced organizations to evolve from traditional client management tools. Embra...

Your mission as a security professional (you already chose to accept this mission – so backing out is sadly not an option) is to protect all sensitive enterprise data. How can you do that when you s...

According to IDC, 94% of organizations are already reassessing, modifying, or overhauling their network to facilitate app delivery for a cloud-first world. Wanting to dive deeper, Citrix commissione...

Are your bandwidth demands growing faster than your telecom budget? As more desktops, applications, and services move into the cloud, reliance on the wide area network (WAN) is higher than ever—outa...

Organizations around the world are embracing Office 365 as their tool of choice for productivity applications including word processing, email, presentations, and more. However, it is critical to ha...

Today, emerging technologies have the potential to create disruptive business models in the financial services industry. Citrix and HPE power the digital transformation of financial services institu...

Goliath Technologies Citrix Ready verified products help organizations proactively manage their Citrix environments, whether on-premise or in the cloud. In this webinar, you will hear from Citrix Vi...

Your users expect a seamless, modern experience no matter how they access corporate data and from any device they choose. Yet organizations have deployed point solutions to provide access to corpora...

Your users expect a seamless, modern experience no matter how they access corporate data and from any device they choose. Yet organizations have deployed point solutions to provide access to corpora...

Your users expect a seamless, modern experience no matter how they access corporate data and from any device they choose. Yet organizations have deployed point solutions to provide access to corpora...

Is your organization facing heightened IT security threats? Do you work in a highly regulated industry across different systems and devices? Are you worried about your compliance with the new GDPR?
...

A recent survey of clinicians by HIMSS Analytics shows that despite the spotlight on HIPAA compliance and security issues in healthcare, clinicians report several IT vulnerabilities at provider orga...

ADCs have largely become commoditized, and the services they provide are fairly indistinguishable from the sea of competitors on the market today. With many data center architects faced with moderni...

Work is shifting away from your employees’ desktops and into disaggregated cloud services. Without the right tools in place, you can easily lose control, insight, and governance over the SaaS apps a...

Ransomware is one of the biggest nightmares facing IT today. Hackers are targeting organizations of all kinds with malware designed to encrypt crucial data—and hold it hostage until payment is made....

Mobility is now common place in most enterprise organizations. However, managing smartphones and tablets separately from managing traditional endpoints, including desktops and laptops, can be expens...

Your mission as a security professional (you already chose to accept this mission – so backing out is sadly not an option) is to protect all sensitive enterprise data. How can you do that when you s...

Historically, corporate data security focused on network-centric devices. One would protect the network at the perimeter, then build layers of defenses much like an onion or parfait has layers. Encr...

In this TechTalk, discover how you can gain the controls needed to ensure the right levels of authentication and authorization. This session will introduce the basics for those new in the identity m...

The concept of work is changing: users have come to expect a mobile, flexible and seamless workspace experience. To meet these changing requirements, you need more than a traditional Enterprise Mobi...

Aberdeen Group research has shown that, when businesses leverage these emerging technologies, they see benefits in terms of faster application performance, increased user satisfaction, and reduced d...

Applications are moving to the cloud; they are either migrating from the data-center or they are being developed as cloud native applications. In addition, driven by micro-services architectures and...

New to Citrix Cloud? Not sure how to start using it? How to ensure application availability? During this webinar we will give you the answer to these questions. What will you learn: How to register ...

Are your bandwidth demands growing faster than your telecom budget? As more desktops, applications, and services move into the cloud, reliance on the wide area network (WAN) is higher than ever—outa...

Organizations are increasingly dealing with security issues on a day to day basis with data loss being a significant concern. Employees regularly share files with entities outside the organization, ...

How are you going to keep up with the rapid release schedule or prevent app compatibility and device management issues? In this web seminar, industry expert and WindowsIT Pro contributor Theresa Mil...

Files and data are in constant motion, and even with the best intentions, employees are often sharing information using non-secure file sharing services to get work done. If you’re allowing employee...

Malware is the top security threat to the financial services industry. It can be used to attack web and mobile apps, and internal systems to gain access to money transfer apps. With banks continuing...

When it comes to designing a future-ready infrastructure, healthcare IT leaders need to dream big. If you haven’t explored how your organization can implement a cloud solution, now is the time to th...

Organizations are at risk for security breaches due to the complexity of business and IT operations. A new security framework is needed, one that simplifies security by shifting IT away from device-...

Migrating your Citrix environment to a new version on Windows Server can be a tricky proposition, but Citrix Education is here to help! We’ve been hard at work on a new course which will give you th...

As enterprises and government agencies continue to deliver more and more applications and services online, application security efficacy becomes critical. Securing web applications that meet complia...

Join us as we give you a 1 hour preview of CXM-303: Deploying Enterprise Mobility Solutions with Citrix XenMobile. During this Citrix Education Course Preview Webinar, we will be focusing on the “Lo...

Join this webinar to see how NetScaler insights can provide you with complete visibility for virtual applications delivered by Citrix XenApp and XenDesktop to ensure your users have the best experie...

Join us as we give you a 1 hour preview of CXD-203: Managing App and Desktop Solutions with Citrix XenApp and XenDesktop 7.6. During this Citrix Education Course Preview Webinar, we will be focusing...

Anuta NCX is a network service orchestration platform that automates legacy physical, SDN as well as NFV infrastructure. NCX helps to automate policies across multi-vendor infrastructure so that you...

Join us as we give you a 1 hour preview of CNS-320: Citrix NetScaler Security, Management and Optimization. During this Citrix Education Course Preview Webinar, we will be focusing on providing an i...

It only takes a glance at the headlines to know that security is the top of mind concern for healthcare IT professionals today. So it’s no surprise that security is top of the list for reasons why c...

Much of the focus on digital banking and insurance has been on consumer self-service through the web and mobile. However, CEB research shows a persistent reliance on physical locations and contact c...

Solving the Issues Around how Sensitive Data is Stored and Shared Among Internal and External Users. In this webinar, we will share use cases to learn what you need to know to enable your enterprise...

Join us for a live-streamed virtual event to learn how Citrix and Microsoft are collaborating in the cloud to deliver turnkey services hosted on Azure that radically simplify app and desktop deliver...

Join us as we give you a 1 hour preview of CXD-300: Deploying App and Desktop Solutions with Citrix XenApp and XenDesktop 7.6. During this Citrix Education Course Preview Webinar, we will be focusin...

Join us for a FREE course preview webinar: CXD-230 XenApp and XenDesktop Current Release! In this webinar you will learn about AppDisk features within the Provisioning module. Don't miss your chance...

When it comes to data security in mobile healthcare environments, clinician experience and data protection are both important. Healthcare IT leaders must make strategic choices as to what types of s...

Citrix commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential ROI enterprises can realize by deploying Citrix XenApp to their workforce. The resu...

Citrix commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential ROI enterprises can realize by deploying Citrix XenApp to their workforce. The resu...

According to Forrester Research, 2015 e-commerce consumer spend is projected to reach $334 billion. Thus this holiday shopping season promises to be another record year for online sales. Is your dat...

Join us as we dive into Citrix Education's new course, CNS-222: Citrix NetScaler for Apps and Desktops. During this 1 hour webinar, we will provide an overview of the course's Unified Gateway module...

In this free webinar, Citrix ShareFile StorageZones Product Manager Anirban Chakraborty will teach you how to securely store your ShareFile data in Microsoft Azure. This will be a hands-on experienc...

The rapidly-changing pace of technology impacts the way we do business, communicate, teach and learn – especially within our schools. School districts are looking for new, innovative ways to better ...

Join us as we dive into Citrix Education's new course, CSF-201: Citrix ShareFile Enterprise Essentials. During this 30 minute webinar, we will provide an overview of Citrix ShareFile and what you ca...

Banks and credit unions are constantly under scrutiny for meeting security regulations and undergoing FFIEC compliance audits – with good reason. Customers trust their financial institution with hig...

Today’s modern students arrive on campus with a different expectation than previous generations before them. They expect institutions to provide them with the same digital experience as in their per...

Employees are embracing Windows 10 in droves. According to Microsoft, the free upgrade for consumer devices has been successfully delivered to more than 200 million devices in just six months. These...

Oscar and Jerry will walk through the various design decisions made at DTMB in order to support agencies’ differing security requirements as part of their statewide IT consolidation. Learn how DTMB ...